Filter interviews by
I applied via Referral and was interviewed before Oct 2023. There were 2 interview rounds.
It was 2 easy/medium question on codilty
Design a scalable and reliable messaging service component
Use a distributed system architecture to handle high volume of messages
Implement message queues for asynchronous communication
Ensure message delivery with retries and acknowledgements
Support message encryption for security
Include monitoring and logging for performance tracking
I applied via Company Website and was interviewed in Sep 2021. There were 3 interview rounds.
Based on resume and one coding based on finding the nested list and dictionary values and validate.
Lot of case studies and situations based on security
Top trending discussions
I was interviewed before May 2021.
Round duration - 45 minutes
Round difficulty - Easy
Technical Interview round with questions on DSA
Given a Binary Tree of integers, your task is to return the level order traversal of the tree.
The first line contains an integer 'T' which denotes the number...
Return the level order traversal of a Binary Tree of integers.
Perform a level order traversal using a queue data structure
Start by pushing the root node into the queue
Pop each node from the queue, print its value, and push its children into the queue
Given an integer N
, your task is to compute the number that results from swapping each even position bit of N
's binary representation with its adjacent odd bit to...
Swap each even position bit of an integer with its adjacent odd bit to the right in binary representation.
Iterate through the binary representation of the integer and swap adjacent bits at even positions with odd positions.
Convert the modified binary representation back to an integer to get the final result.
Handle edge cases like leading zeros in binary representation.
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on Networking.
Components of an IP packet header
Version
Header Length
Type of Service
Total Length
Identification
Flags
Fragment Offset
Time to Live
Protocol
Header Checksum
Source IP Address
Destination IP Address
Options
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless and does not establish a connection.
TCP is reliable as it ensures all data packets are received in order and retransmits any lost packets, while UDP does not guarantee delivery or order of packets.
TCP is slo...
The TCP segment header consists of various components that help in the transmission of data over a network.
Source Port
Destination Port
Sequence Number
Acknowledgment Number
Data Offset
Reserved
Flags
Window Size
Checksum
Urgent Pointer
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
IP packet header fields and their usage
Version: indicates the IP version being used (IPv4 or IPv6)
Header Length: specifies the length of the IP header
Type of Service: used to prioritize packets
Total Length: specifies the total length of the IP packet
Identification: used to identify fragments of a larger packet
Flags: used to control fragmentation
Fragment Offset: used to reassemble fragmented packets
Time to Live: specifi...
TCP packet header fields and their usage
TCP packet header consists of 20 bytes
Fields include source and destination ports, sequence and acknowledgement numbers, flags, window size, and checksum
Source and destination ports identify the endpoints of the connection
Sequence and acknowledgement numbers are used for reliable data transfer
Flags indicate the purpose of the packet, such as SYN, ACK, FIN, RST
Window size is used ...
A program to implement a dictionary using an array of strings.
Use an array of strings to store the words and their definitions.
Implement functions to add, delete, and search for words.
Consider using a hash table for faster search times.
Implement a telephone directory program using an array of strings.
Create an array of strings to store the directory
Implement functions to add, delete, and search for entries
Consider using a hash table for faster search times
Include error handling for invalid input
TCP is a reliable, connection-oriented protocol while UDP is a faster, unreliable, connectionless protocol.
TCP ensures data delivery and error checking while UDP does not.
TCP establishes a connection before data transfer while UDP does not.
TCP is used for applications that require reliable data transfer like email, file transfer, etc. while UDP is used for applications that require speed like online gaming, video strea
Security is important in a system to protect against unauthorized access, data breaches, and cyber attacks.
Prevents unauthorized access to sensitive data
Protects against data breaches and cyber attacks
Ensures confidentiality, integrity, and availability of data
Compliance with regulations and standards
Maintains trust and confidence of customers and stakeholders
Printing a tree in level order
Use a queue to store nodes in level order
Enqueue root node and print its value
Dequeue the node and enqueue its children
Repeat until queue is empty
Swapping two particular bits of an integer program.
Use bitwise operators to get the values of the two bits to be swapped
Use XOR operator to swap the bits
Shift the bits back to their original positions
Example: Swapping 2nd and 5th bits of 8 (1000) gives 32 (100000)
Example code: num ^= (1 << bit1) | (1 << bit2);
posted on 13 Jun 2024
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
The task was a Codility type
I applied via LinkedIn and was interviewed in Aug 2024. There were 2 interview rounds.
Dataweave logic questions
Easy problem on java
I applied via LinkedIn and was interviewed in Sep 2020. There was 1 interview round.
I applied via Recruitment Consulltant
A mutex is a synchronization primitive that ensures only one thread can access a resource at a time.
Create a mutex object using the appropriate library or language-specific function.
Lock the mutex before accessing the shared resource to prevent other threads from accessing it.
Unlock the mutex after finishing the operation on the shared resource to allow other threads to access it.
Example: pthread_mutex_t mutex; pthread...
Identify memory leak in code
Check for any dynamically allocated memory that is not being freed
Look for any infinite loops or recursive functions that consume memory
Use memory profiling tools like Valgrind to detect leaks
Check for any global variables that are not properly managed
I applied via Company Website and was interviewed in May 2022. There were 2 interview rounds.
Logical reasoning And aptitude test
C++, python and Java programming
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Senior Staff Engineer
48
salaries
| ₹0 L/yr - ₹0 L/yr |
TAC Engineer
31
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
30
salaries
| ₹0 L/yr - ₹0 L/yr |
Principal Engineer
29
salaries
| ₹0 L/yr - ₹0 L/yr |
Staff Engineer
27
salaries
| ₹0 L/yr - ₹0 L/yr |
Check Point Software Technologies
Fortinet
FireEye
Gen